Security analysts have a problem, and it isn’t their fault. Due to lack of context regarding emerging threats, they are understandably confused about how to strategically prioritize remediations in an impactful way. On a daily basis, analysts can see thousands of newly registered domains (NRD) stacking up on the internet, a significant portion of which will turn out to be malicious, suspicious, or not safe for work. According to APWG’s Phishing Trends Summary for 2024, in Q4 2024, 989,123 phishing attacks were recorded, marking an increase from 877,536 in Q2 and 932,923 in Q3. With an average of about 250,000 NRDs detected on a daily basis, the volume and level of detection efficiency can greatly impact the takedown capabilities of any company.
But it doesn’t start here. Unbeknownst to the average internet user, there’s a whole world of cybercriminal activity occurring on the deep and dark webs, where these malicious campaigns are built, bought, and sold. Whenever an adversarial campaign launches its operations to target industries, employees, or even consumers, domains are the key element to their mass targeting and propagation.
As a defensive tactic, many organizations deploy domain takedowns to tackle the suspicious and malicious infrastructures that threaten their users, customers, and clients on the surface web. However, traditional takedown methodologies are largely ineffective in this new era of advanced cybercriminal tactics.
Why are traditional takedowns becoming so unsuccessful? Because in order to achieve a single successful malicious domain takedown, the defender must rely on several things to fall into place that are mostly out of their control. Here is a quick overview of what must take place to remove one malicious domain:
This is an abbreviated list of what is required for ONE takedown. Multiply that across hundreds or thousands of AI-generated malicious domains and it gets exponentially more difficult to manage. To make matters worse, many takedown attempts yield poor results due to lagged responses and/or delayed actions on the part of certain registrars that are popular with the criminals perpetrating these malicious activities. At the end of the day, all these efforts could be in vain, as an unresponsive or uncooperative host or registrar may never complete the takedown, even with substantial evidence.
Frankly, one takedown is merely a drop in the bucket when the malicious infrastructures are being spun up at scale. Traditional takedowns essentially only skim off the superficial level of threats when observed from an DNS (Domain Name System) adversarial perspective. It will not disrupt the root of the malicious operations, unless the detection systems and takedowns are collectively stronger and swifter than before. Today we’ll compare key points to consider when discussing the difference between domain adversary disruption and takedowns.
But then, why is it still worth discussing takedowns today? It is because domains remain one of the quickest and most effective ways to reach the victims at scale, through various social engineering methods, such as phishing, brand impersonation, and email spam. Therefore, while the broader goal should be domain adversary disruption, takedowns still remain an important element in making it possible.
Traditional takedown methods will not disrupt the root and disincentivize a malicious operation if it cannot quickly and consistently perform at a scale comparable to that of the attackers. This isn’t to say that there is no longer a need for manual takedowns, but that a modernized approach of automated, multi-pronged approach of adversarial disruption is the solution necessary for modern security teams to defend against cascading domain-based threats.
According to threat intelligence and malicious domains analysis expert, Abu Qureshi, there’s been a developing pattern of DNS abuse showing the potential to be advanced with website-based adversarial campaigns.
There are several typical ways DNS adversaries try to target victims. Generally, one of the following methods is used in social engineering campaigns:
Smart cybercriminal’s technique includes modern, novel, and effective techniques getting deployed across the internet all the time. But how do they get a domain in the first place? Here are some emerging trends Qureshi recently compiled:
In this novel practice, cybercriminals set up legal companies using fraudulent documents. When a takedown is requested on a domain hosted by a legally-owned company, the domain owner can request a reversal of locks if the proof provided by the threat analyst is insufficient, even if the site is proliferating illegal activity. This can make it difficult for researchers to verify the company’s legitimate existence and execute a takedown.
Many hosting providers and registrars hide domain ownership information. With this information hidden, identifying people running destructive cyber campaigns can be extremely challenging. Attribution for adversarial disruption purposes is still a common pain point for most researchers.
With this method, cybercriminals use fixed, short-term campaigns using reputable, secure registrars offering enhanced identity protection features. Adversaries leverage free trials offered by domain registration services or obtain vouchers for deeply discounted fees via dark web marketplaces.
Additionally, the takedown process can be greatly affected by geographical distribution. Varied time zones, inconsistent business hours, workloads, language barriers, response times, and acts of nature can all cause significant time lags on a takedown request.
Adversarial campaigns generally begin in dark web marketplaces: forums that offer assorted tools, services, and hosting providers to cybercriminals on a subscription basis. These marketplaces harbor a collaborative environment and offer dedicated forums devoted to “the tricks of the trade” for proliferating fraudulent websites, like gathering traffic, search engine optimization, and which hosting solutions are best for evading legal notices for takedowns.
Traditional takedown methods are not likely to impact the cybercrime trends mentioned above.
In the case of all these methods, it’s very possible that, by the time a campaign or a pattern is identified and the takedown is completed, the damage has already been done and the malicious operation has achieved its desired result. Then, once the campaign is completed, infrastructure such as domains, emails, and IPs are left dormant or removed from hosting by the cybercriminals.
This raises a couple questions: On what scale should you prioritize a takedown? Should you engage experienced experts to help manage the problem of malicious domains?
It is standard practice for cybercriminals to target well-known companies that may not address security issues promptly and regularly. Large, familiar business-to-consumer (B2C) organizations with high levels of web traffic and user engagement tend to be default targets. These companies must rely on a combination of an in-house security team with an external vendor with expertise in executing takedowns at scale.
For smaller businesses, it’s good practice to stay aware of the latest cybersecurity news and understand whether customers have faced any malicious campaigns or impersonation attacks. If yes, then a dedicated takedown team should be engaged to hunt down the domains and perpetrators or take further legal actions.
However, is executing a takedown enough? Opinions may differ here. Takedowns are useful to remove any internet-facing threats hosted by an adversary, since these remain one of the easiest ways for cybercriminals to spread malicious campaigns.
Has our reliance on traditional takedown methods produced the results we were hoping for? It solves only part of a problem. The adversary still has an opportunity to relocate or rotate different campaigns in parallel to prolong the lifespan of their malicious operations. That is why a takedown in itself will stop the domains used in a campaign– but not the adversary.
The main reason why companies should focus on adversarial disruption as part of their cyber defense strategy is to eliminate the cybercriminals’ operational infrastructure right at its roots. This includes addressing every component: domains, IP addresses, email accounts (potentially exploitable for BEC attacks), phishing kits, file hashes, and indicators of future activity. Adoption of this concept of addressing the full spectrum of the adversary’s assets would help organizations eliminate the criminals’ chances of quick comebacks.
Furthermore, the process of collecting intelligence and providing contextual analysis on the criminal infrastructure provides the analysts with the ability to execute bulk takedowns, without having to do them one at a time. This intelligence can include:
These intelligence leads can be shared with relevant technical consumers and business stakeholders. Once enough adversarial threat intelligence is gathered, the next best steps for the security teams is to minimize its impact through takedowns.
As discussed above, disrupting domain adversaries is slightly more involved than just conducting takedowns. Since simply performing traditional takedown steps, such as sending a notice to the domain registrars and hosting providers with evidence often won’t help, here’s what an organization should do: AUTOMATE repeatable processes!
The right automation tool can provide busy security teams with many benefits. Automation can quickly, accurately, and preemptively identify and remediate certain repetitive, low-level threats at scale. If the tool is augmented with predictive AI, it will be able to trigger these actions more autonomously and to handle larger data sets, to predict and prioritize threats so that the security team can focus on the ones that require a human touch.
Here are some additional areas where automation can enhance traditional takedowns and have stronger focus on disruption:
By establishing a seamless and efficient takedown workflow leveraging automated kill switches, APIs, and reporting mechanisms, a company can report malicious domains in a much more scalable manner versus cumbersome traditional templated takedowns and manual outreach.
During the takedown process, a lot of threat intelligence (i.e. threat actors, IOCs, etc.) is collected. By automating IOC usage and threat data by feeding it directly into the takedown report, operators will experience a game-changing shift in the amount of time spent investigating and verifying a threat.
When intelligence regarding a specific threat is gathered, most companies share it with business stakeholders, peer companies, and even the general public to raise awareness and minimize the threat’s impact. By automating malicious domain disruption and takedown-sharing with your industry peers and partners, a ripple effect is generated; aiding in diminishing the threat and harboring stronger partnerships.
By implementing and enhancing automation in the above areas, security teams in a company can remain focused on other pain points in the organization, and maintain business continuity and scalability.
When automation removes most of the mundane, day-to-day tasks associated with the majority of takedowns, security experts can better focus on the more complex intricacies of performing takedowns due to DNS abuse. DNS abuse is broken into different categories including botnets, malware, pharming, phishing, and spam. These categories overlap with slight differences that each require tailored approaches such as prioritization, intent analysis, chaining the threat, identifying affected industries, and more.
AI plays a critical role on both sides, malicious domain registration and intelligence-driven automated takedowns. By leveraging predictive intelligence indicators, we can accurately assess the potential risk or malicious intent of a domain before it becomes active. This preemptive approach significantly reduces the effectiveness of evasion tactics and loopholes employed by adversaries. DNS adversary disruption definitely deserves additional attention!
While the advantages of having experienced experts to help manage the problem of malicious takedowns can’t be ignored, it doesn’t mean automation shouldn’t be used where appropriate. Certain measures taken to expedite and streamline risk analysis, threat indication, and threat prioritization for every domain can help teams act more effectively. By dividing every step for a domain takedown into smaller, more manageable segments, and identifying the areas where automation can help, security analysis teams can save a lot of time and energy.
The rise of predictive security solutions that anticipate attacks before they happen introduce a preemptive element that gives security teams a leading edge over the attackers. What can be better than to disrupt a cybercriminal infrastructure before it even begins? The ability to leverage predictive defenses to anticipate, preempt, and deter cybercriminals before they start an attack gives us a glimpse of the future of DNS abuse management and the entire takedown process.